Search Results for Security. - Narrowed by: Engineering mathematics. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Engineering$002bmathematics.$002509Engineering$002bmathematics.$0026ic$003dtrue$0026ps$003d300? 2024-12-04T16:18:47Z Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Multimedia Analysis for Security Applications ent://SD_ILS/0/SD_ILS:191792 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Sencar, Husrev Taha. editor.&#160;Velastin, Sergio. editor.&#160;Nikolaidis, Nikolaos. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11756-5">http://dx.doi.org/10.1007/978-3-642-11756-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:164930 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Tilborg, Henk C. A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Operations Research for Homeland Security ent://SD_ILS/0/SD_ILS:331730 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Herrmann, Jeffrey W. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331730.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5278-2">http://dx.doi.org/10.1007/978-1-4614-5278-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Techniques and Applications ent://SD_ILS/0/SD_ILS:185738 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Chen, Hsinchun. editor.&#160;Yang, Christopher C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Information Assurance and Security ent://SD_ILS/0/SD_ILS:186171 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Nedjah, Nadia. editor.&#160;Abraham, Ajith. editor.&#160;Mourelle, Luiza de Macedo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group Testing Theory in Network Security An Advanced Solution ent://SD_ILS/0/SD_ILS:173597 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Thai, My T. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0128-5">http://dx.doi.org/10.1007/978-1-4614-0128-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Estimating Impact A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions ent://SD_ILS/0/SD_ILS:172534 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Kott, Alexander. editor.&#160;Citrenbaum, Gary. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6235-5">http://dx.doi.org/10.1007/978-1-4419-6235-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence in Security for Information Systems CISIS&rsquo;09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings ent://SD_ILS/0/SD_ILS:190834 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Herrero, &Aacute;lvaro. editor.&#160;Gastaldo, Paolo. editor.&#160;Zunino, Rodolfo. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04091-7">http://dx.doi.org/10.1007/978-3-642-04091-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS&rsquo;08 ent://SD_ILS/0/SD_ILS:189000 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Corchado, Emilio. editor.&#160;Zunino, Rodolfo. editor.&#160;Gastaldo, Paolo. editor.&#160;Herrero, &Aacute;lvaro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88181-0">http://dx.doi.org/10.1007/978-3-540-88181-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers ent://SD_ILS/0/SD_ILS:190658 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Setola, Roberto. editor.&#160;Geretshuber, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Monitoring, Security, and Rescue Techniques in Multiagent Systems ent://SD_ILS/0/SD_ILS:183313 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Dunin-K&#281;plicz, Barbara. author.&#160;Jankowski, Andrzej. author.&#160;Skowron, Andrzej. author.&#160;Szczuka, Marcin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:401558 2024-12-04T16:18:47Z 2024-12-04T16:18:47Z Author&#160;Takagi, Tsuyoshi. editor.&#160;Wakayama, Masato. editor.&#160;Tanaka, Keisuke. editor.&#160;Kunihiro, Noboru. editor.&#160;Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>